1994-08-19 - Re: cfs & remailers

Header Data

From: Jim Hart <hart@chaos.bsu.edu>
To: wmo@digibd.com (Bill O’Hanlon)
Message Hash: ba82ae992f2ab33f00f5308b0bc5c23e22681e454b7b520f35d0259944c15adb
Message ID: <199408190757.CAA24886@chaos.bsu.edu>
Reply To: <9408172311.AA02156@poe.digibd.com>
UTC Datetime: 1994-08-19 07:58:16 UTC
Raw Date: Fri, 19 Aug 94 00:58:16 PDT

Raw message

From: Jim Hart <hart@chaos.bsu.edu>
Date: Fri, 19 Aug 94 00:58:16 PDT
To: wmo@digibd.com (Bill O'Hanlon)
Subject: Re: cfs & remailers
In-Reply-To: <9408172311.AA02156@poe.digibd.com>
Message-ID: <199408190757.CAA24886@chaos.bsu.edu>
MIME-Version: 1.0
Content-Type: text/plain



Bill O Hanlon:
> In that case, even if I were to keep logs, all that anyone would know from
> a message is that a particular user used a remailer, or that a particular
> cleartext message had a certain remailer as its jumpoff point.  Not both.

They'd learn both if they had snooped the entire remail chain (which
is the equivalent of collusion).   Going back and retrieving logs
for all the the links, after the snoopers have discovered an
important message they want to trace, is both an easier and a more 
likely attack than wiretapping all the links in real time in 
anticipation of an important message -- unless the remailer 
operators snoop-proof their logs.

Also keep in mind that, given the lack of a good user interface,
there is currently too little properly encrypted and nested remailer
traffic to create anything approaching a true digital mix.

Jim Hart				
hart@chaos.bsu.edu




Thread